fortify

Desktop and application virtualization have steadily gained ground to address a broad range of use cases across organizations of all sizes. According to ESG research, over the past few years, desktop virtualization has consistently risen to be included among the five most commonly-identified IT priorities, alongside such perennial corporate objectives as fortifying cybersecurity and managing data growth.

Welcome to the first edition of MobileIron Security Labs (MISL) quarterly Mobile Security and Risk Review. This report provides insights into the state of the mobile security and threat landscape, highlights emerging risks, and recommends ways to fortify mobile enterprise deployments.

New headlines provide ongoing evidence that IT Security teams are losing the battle against attackers, reinforcing the need to address the security of enterprise applications.This Analyst Insight reviews several practical steps you can take to get started now.

Download this white paper to learn:
- How the use of advanced analytics generates powerful insights to stay ahead of evolving cyber threats.
- Why security infrastructure protection alone is not enough to thwart cyber criminals, and how you can fortify your existing security strategy.
- How the use of both machine led analytics with human led analysis can help you mitigate threats.

If your company stores or processes credit card information, you must be able to demonstrate compliance with the Payment Card Industry (PCI) Data Security Standards (DSS). These standards include requirements for security management, policies, procedures, network architecture, design, and other critical protective measures. They also include one very prescriptive requirement: Section 6.6 mandates that organizations secure all Web applications by conducting a code review or installing an application layer firewall. Companies have had a very difficult time passing the other parts of Section 6 and they have experienced a rising number of data breaches. Unless companies take 6.6 seriously, PCI compliance failure rates, and data breaches, will continue to grow. Read this whitepaper to gain an overview of best practices to pass Section 6.6 and an understanding of the technology available to you.

Is open source secure? How much business risk is introduced with it? Fortify surveyed the open source community for an answer and revealed that open source projects lack the three essential elements of security: people, process and technology. Read this research to discover what actions can reduce these risks within your organization.

The hacking community has shifted its effort toward a new frontier: the application layer. How are companies responding? Business Software Assurance – the capability to address the problem of application risk within an enterprise. This whitepaper provides an overview of the severity of the problem along with everything needed to develop Business Software Assurance in your organization.

Fortify's report summarizes electronic as well as traditional methods of voting including absentee ballots. This voting guide will provide recommendations for voters who want to make sure their vote counts and for federal and state governments on how to devise efficient and accurate voting processes and systems.

Fortify Software conducted a candid interview with Avi Rubin, Professor at Johns Hopkins University and specialist in the field of eVoting security risks. He discusses the concerns around software security as well as the voting solutions surrounding software independence.

For a CISO, open source introduces a new source of risk and unique security challenge: how do you influence developers over whom you have no direct management control? Jennifer Bayuk, former CISO of Bear Stearns, provides insight on best practices for evaluating, deploying and managing open source code.

While investments to secure the enterprise continue to rise, breaches into company systems and data are skyrocketing. These cyber crimes are consistently debilitating organizations operations, reputations and ultimately, viability. Today’s CEOs are demanding aggressive strategies to protect their business. CIOs and CSOs are working together to employ proven Business Software Assurance approaches across the enterprise to stay ahead of constant threats.

With an extensive background in police, military, government, and industry security, Howard Schmidt explains how to respond to the changing landscape of cyber threats and how business leaders are helping set the standards for application security. He then profiles industry role models who are setting the standard for application security.

This white paper describes how containers and microservices work, the benefits and challenges of using them, and how a unified view of the enterprise stack and effective application performance monitoring (APM) can help to fortify their benefits and address their challenges.

This white paper describes how containers and microservices work, the benefits and challenges of using them, and how a unified view of the enterprise stack and effective application performance monitoring (APM) can help to fortify their benefits and address their challenges

The rising demands for capturing and managing video surveillance data are placing new pressures on state and local governments, law enforcement agencies, and education officials. The challenges go beyond the expanding costs of equipment, storage, software and management time. Officials must also lay the right foundation to scale their capabilities, improve performance and still remain flexible in a rapidly evolving ecosystem of surveillance tools.
Find out what state, local government and education IT leaders need to know, and what steps you can take to:
• Improve performance and ROI on cameras-per-server for the dollars invested
• Optimize and simplify the management of daily surveillance processing, including the integration of facial recognition, redaction and analysis software
• Fortify reliability and dependability to reduce the risk of surveillance data retrieval failures.

Security practitioners and threat actors are constantly developing new techniques to gain advantages over the other. In recent years, security teams have stepped up their approaches to protecting their infrastructure by fortifying their network perimeter defenses, building up protections against advanced malware, upgrading vulnerable operating systems, automating the delivery of patches to stop exploits, and developing counter-measures to spot intruders. The threat actors looking to circumvent these measures are shifting their attention toward the next weakest link in the security chain – the user.

IBM Security, in partnership with the Center for Applied Insights, has launched the 2014 IBM CISO Assessment. Driven by the specter of external attacks and the needs of their own organizations, CISO's are continuing the shift toward a business leadership role that focuses on risk management and taking a more integrated and systemic approach.

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.

Advertise with us

Advertise with HSJ, the UKâ€™s leading health service management and policy title and reach an audience of healthcare leaders.

We provide a whole range of media solutions to help you reach your marketing objectives.

Subscribe to HSJ

As the essential resource on health management and policy, HSJ gives you invaluable insights to keep you up to speed with developments in the fast moving health service. Subscribe today and get complete access to hsj.co.uk, plus HSJ magazine delivered to your door each week.

About HSJ

HSJ.co.uk and Health Service Journal are your source for NHS news and NHS jobs. Log on or subscribe to stay on top of health management and policy issues.
From commissioning to mental health, from policy making to the front line, HSJ offers unrivalled news, analysis and opinion.